TW486902B - Method capable of preventing electronic documents from being illegally copied and its system - Google Patents

Method capable of preventing electronic documents from being illegally copied and its system Download PDF

Info

Publication number
TW486902B
TW486902B TW089116219A TW89116219A TW486902B TW 486902 B TW486902 B TW 486902B TW 089116219 A TW089116219 A TW 089116219A TW 89116219 A TW89116219 A TW 89116219A TW 486902 B TW486902 B TW 486902B
Authority
TW
Taiwan
Prior art keywords
terminal
encryption key
identification code
user
server host
Prior art date
Application number
TW089116219A
Other languages
Chinese (zh)
Inventor
Ta-Kuang Yang
Original Assignee
Neovue Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neovue Inc filed Critical Neovue Inc
Priority to TW089116219A priority Critical patent/TW486902B/en
Priority to US09/682,256 priority patent/US20020034304A1/en
Application granted granted Critical
Publication of TW486902B publication Critical patent/TW486902B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/605Copy protection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a method used in a computer system for preventing electronic documents from being illegally copied. The computer system includes a server connected to a plurality of terminals via an Internet. Each terminal has at least one computer identification code representing the terminal. The method comprises a registration procedure and a document demand procedure. The registration procedure includes the following steps: (1) the user loads a reading application program in a terminal, and the reading application program includes a first encryption key; (2) the user registers to the server via the reading application program as a legal terminal, and thus the server obtains the related user data; (3) after completing the legal registration for the terminal, the server generates an user identification code and a second encryption key dedicated for the user, and the user identification code and the second encryption key are encrypted by the first encryption key and transmitted to the legally registered terminal; and (4) when the computer identification code obtained from being compared by the reading application program is the same as the computer identification code of the current terminal, the second encryption key is used to decrypt the received encrypted text; otherwise, the subsequent decryption is terminated to prevent the electronic document from being copied by illegal terminals.

Description

486902 五、發明說明(1) 本發明係提供一種使用於電腦系統中可防止電子 盜拷的方法,尤指一種可防止利用網際網路下載電子 至一電子閱讀裝置,卻又非法拷貝至其他電子閱讀裝 方法。 傳統上知識是靠印刷於紙張上的書籍或雜誌來加 播,廣播及電視興起後加快了知識傳播的速度,如今 通訊及網際網路的蓬勃發展,更以驚人的速度將知識 訊傳播到世界上各個角落。由於網際網路技術的發展 造出許多新的商業模式,這些新的商業模式有一個共 特點,就是利用網際網路來做生意,也就是近來通稱 子商務。舉例而言,傳統上如果要購買書籍必須親自 人到書店尋找後加以購買,由於網際網路的興起’如 AMAZON等網路書店可以讓使用者在線上搜尋到想要的 並可直接下單購買。雖然,這使得購買書籍的方式大 化,然而,這還是有一個不方便之處,就是有關書籍 存,一但書籍購買的愈多愈需要足夠的空間來加以放 同時管理上也更加繁雜。 有鑑於此,「電子閱讀裝置」的概念遂被提出以 此種需要,也就是說將原來書籍中的文字或圖片數位 形成電子書籍,消費者只要有一台終端機可以連接上 再加上某些特定的程式軟體,就可以很方便地於線上 想要的電子書籍或文件,並將此電子書籍下傳到消費 文件 文件 置的 以傳 電腦 與資 ,創 同的 的電 或請 書I皆 為簡 的保 置, 因應 化, 網, 購買 者所486902 V. Description of the invention (1) The present invention provides a method for preventing electronic piracy in a computer system, especially a method for preventing the use of the Internet to download electrons to an electronic reading device, but illegally copying to other electronic devices. Read how to install. Traditionally, knowledge was broadcasted by books or magazines printed on paper. The rise of radio and television accelerated the spread of knowledge. Today, the rapid development of communications and the Internet has spread knowledge to the world at an alarming rate. On every corner. Due to the development of Internet technology, many new business models have been created. These new business models have a common feature in that they use the Internet to do business, which is known as sub-commerce recently. For example, traditionally, if you want to buy a book, you have to go to the bookstore to find it and buy it. Due to the rise of the Internet, online bookstores such as AMAZON allow users to find what they want online and place an order. . Although this makes the way of purchasing books larger, there is still an inconvenience that is related to the storage of books. Once more books are purchased, more and more space is needed to store them, and management is more complicated. In view of this, the concept of "e-reading device" has been proposed to meet this need, that is, to digitally form the text or pictures in the original book into an e-book. Consumers only need a terminal to connect to it and add some With specific program software, you can easily download the e-books or documents you want online, and download the e-books to the consumer document files for the transfer of computers and information. Retention, response, net, buyer

486902 五、發明說明(2) 在的終端機即可進行閱讀,可以符合這種需求的終端機也 就是所謂的「電子閱讀裝置」。曾經也有許多出版集團有 鑒於此一廣大的消費市場而欲投入於電子書店及電子書籍 的經營,然而,卻因為某些配套的機制尚未建立而臨時中 途喊停。原因之一,是消費者閱讀習慣所隱含市場不成熟 的憂慮。也就是說,大部分消費者還是習慣從紙本的形式 來閱讀書籍,想要推動以「電子閱讀裝置」來閱讀電子書 籍必須要推翻消費者根深蒂固的閱讀習慣,同時也必須經 過冗長的教育與適應的過程。然而另一個更重要的因素 是,低廉的再複製成本與簡便的傳播散佈能力,這使得電 子書籍的市場面臨無法推展的嚴重威脅。 這個嚴重威脅來自於從事電子書籍販買的經銷商遭遇 一個很頭痛而難以解決的問題:電子書籍可以很容易多次 拷貝分送給非交易雙方的第三人。電子書籍之所以便利是 由於其屬於無形的電子檔案,相較於有實際形體的傳統書 籍而言自然傳送方便且可以節省大量放置的空間,然而, 也就因為其屬於無形的電子檔案傳送方便,使得消費者於 合法購買閱讀後,卻可以非法的任意加以拷貝傳送並散佈 給其他人。也就是說,如果無法設計出一套完善的電子書 籍交易機制,以有效防止「合法購買卻非法散佈」的情 事,從事電子書籍經銷商每賣出一本電子書籍給某一消費 者,就等於將此電子書籍贈送給了所有其他的消費者,在 這種情形下,經銷商無法維持合理的利潤,這種型式的電486902 V. Description of the invention (2) The terminal can be read at the terminal. The terminal that can meet this demand is also called "electronic reading device". In the past, many publishing groups wanted to invest in the operation of e-bookstores and e-books in view of this large consumer market. However, because some supporting mechanisms had not yet been established, they temporarily stopped. One reason is the immaturity of the market implied by consumers' reading habits. In other words, most consumers are still accustomed to reading books in paper form. To promote the use of "e-reading devices" to read e-books, consumers must overthrow the deep-rooted reading habits of consumers, and must also undergo lengthy education and The process of adaptation. However, another more important factor is the low cost of re-copying and the ability to easily disseminate and disseminate, which makes the market for electronic books face a serious threat that cannot be developed. This serious threat comes from a headache that is hard to solve for dealers engaged in the sale of e-books: E-books can be easily copied and distributed to third parties who are not parties to the transaction. E-books are convenient because they are intangible electronic files. Compared with traditional books with physical forms, they are naturally easier to transfer and can save a lot of space. However, because they are easy to transfer, It allows consumers to purchase and read legally, but can illegally copy and transmit it to other people. In other words, if a complete e-book trading mechanism cannot be designed to effectively prevent the situation of "legitimate purchase but illegal distribution", every time an e-book dealer sells an e-book to a certain consumer, it is equivalent to This e-book was given to all other consumers. In this case, the distributor could not maintain a reasonable profit.

486902 五、發明說明(3) 子商務自然無法生存,這也就是電子書籍至今推展及普及 的速度不如預期的重要原因。然而,電子書籍具有無紙化 符合環保概念、效率化傳播速度快速、經濟化不佔大量空 間等多重優點,可節省許多珍貴的資源,如果只是因為未 能解決上述「合法購買卻非法散佈」的情事而無法加以推 廣,實在是經濟利益的重大損失。 有鑑於上述問題,本發明的主要目的是在提供一種使 用於電腦系統中可防止電子文件盜拷的方法,尤指一種可 防止利用網際網路下載電子文件至一電子閱讀裝置,卻又 非法拷貝至其他電子閱讀裝置的方法,以解決上述問題。 請參閱圖一,圖一為本發明可防止電子文件盜拷之電 腦系統之示意圖。本發明防盜拷電腦系統10 0包含有一伺 服器主機1 0 2可經由一防火牆裝置1 0 3以連接上網際網路 1 0 4,另有複數個使用戶者也可經由各自的終端機1 〇 6、 1 0 8、1 1 0連接上網際網路1 0 4。防火牆裝置1 0 3可用來區隔 伺服器主機1 0 2與其外部的網際網路1 0 4,其可透過網路訊 息封包的過濾以及安全策略的訂定,讓某些特定的網路服 務及安全的網路訊息,例如:經過註冊的遠端登錄、電子 郵件、檔案傳輸等可以進出防火牆裝置1 0 3,以確保伺服 器主機1 0 2中的設定及資訊不會遭受非法入侵及修改。每 一終端機106、108、110可為一個人桌上型電腦(desktop computer)、筆記型電腦(notebook computer)、個人數位486902 V. Description of invention (3) Naturally, sub-commerce cannot survive, which is an important reason why e-books have not been promoted and popularized as fast as expected. However, e-books have the multiple advantages of being paperless in line with the concept of environmental protection, fast in efficiency, and not costing a lot of space, and can save many precious resources. If only the above-mentioned "legal purchase but illegal distribution" is not resolved, The situation cannot be promoted, which is really a great loss of economic benefits. In view of the above problems, the main object of the present invention is to provide a method for preventing electronic documents from being stolen in a computer system, especially a method for preventing electronic documents from being downloaded to an electronic reading device through the Internet, but illegally copying them. To other electronic reading devices to solve the above problems. Please refer to FIG. 1. FIG. 1 is a schematic diagram of a computer system capable of preventing electronic files from being stolen. The anti-theft computer system 100 of the present invention includes a server host 102 that can be connected to the Internet 104 through a firewall device 103, and a plurality of users can also pass through their respective terminals 10. 6, 1 0 8, 1 10 Connect to the Internet 104. The firewall device 103 can be used to separate the server host 10 and the external Internet 104. It can filter the network message packets and set security policies to allow certain specific network services and Secure network messages, such as registered remote login, email, and file transfer, can enter and exit the firewall device 103 to ensure that the settings and information in the server host 102 cannot be illegally invaded or modified. Each terminal 106, 108, 110 can be a personal desktop computer, notebook computer, personal digital

486902 五、發明說明(4) 助理器(P D A )或是可連'接上網的行動電話(W A P c e 1 1 u 1 a r phone)等,只要用戶的終端機是可以連接上網並且傳輸數 位資訊的都可以適用於本發明防盜拷電腦系統1 0 0。 以本發明之較佳實施例而言,終端機1 0 6、1 0 8、1 1 0 為個人桌上型電腦,其中包含一中央處理器,一硬碟機, 一網路卡,輸入裝置如鍵盤、滑鼠、搖桿等,輸出裝置如 螢幕、印表機等。每一終端機1 0 6、1 0 8、1 1 0中並各自具 有至少一電腦辨識碼,用來代表終端機之身分認證,如中 央處理器之辨識碼、硬碟機之辨識碼或是網路卡之辨識碼 等皆可成為該終端機之電腦辨識碼,以便伺服器主機1 〇 2 於後續電子交易或資料傳輸時可以確定各終端機1 〇 6、 1 0 8、1 1 0之身份或位置。 請參閱圖二,圖二為本發明防盜拷電腦系統之伺服器 主機的功能方塊圖。伺服器主機1 0 2包含一介面模組2 1 0, 一公用程式模組2 2 0,一註冊模組2 3 0,一加密餘匙產生模 組2 4 0,一加密模組2 5 0,一交易處理及查證模組2 6 0,一 資料庫2 7 0,與一控制中心2 8 0。 伺服器主機1 0 2經由介面模組2 1 0與防火牆裝置1 0 3相 連接,並透過防火牆裝置1 0 3與網際網路1 0 4進行資料傳輸 與交換,並於必要時對不同規格的資料作適當的資料轉 換。公用程式模組2 2 0中存放有伺服器主機1 0 2對外開放的486902 V. Description of the invention (4) Assistant (PDA) or mobile phone (WAP ce 1 1 u 1 ar phone) that can be connected to the Internet, as long as the user's terminal can connect to the Internet and transmit digital information It can be applied to the anti-theft computer system 100 according to the present invention. According to a preferred embodiment of the present invention, the terminals 106, 108, and 110 are personal desktop computers, which include a central processing unit, a hard disk drive, a network card, and an input device. Such as keyboard, mouse, joystick, etc., output devices such as screen, printer, etc. Each of the terminals 106, 108, 110 has at least one computer identification code, which is used to represent the identity authentication of the terminal, such as the identification code of the central processing unit, the identification code of the hard disk drive, or The identification code of the network card can be used as the computer identification code of the terminal, so that the server host 10 can determine each terminal 1 06, 108, 1 1 0 during subsequent electronic transactions or data transmission. Identity or location. Please refer to FIG. 2. FIG. 2 is a functional block diagram of a server host of the anti-theft computer system of the present invention. The server host 1 0 2 includes an interface module 2 1 0, a utility module 2 2 0, a registration module 2 3 0, a cryptographic key generation module 2 4 0, and a cryptographic module 2 5 0 , A transaction processing and verification module 260, a database 270, and a control center 280. The server host 10 is connected to the firewall device 103 through the interface module 2 10, and transmits and exchanges data with the Internet device 104 through the firewall device 103, and when necessary, it transmits data to different specifications. Data for proper data conversion. The server module 1 2 is stored in the utility module 2 2 0.

第8頁 486902 五、發明說明(5) 各種公用程式,以供使用者免費下載至各自的終端機中, 其中例如一經過編譯的閱讀應用程式,以提供使用者一登 錄、註冊、下載、閱讀電子書籍的使用者操作介面,閱讀 應用程式中並附加有一第一加密鑰匙,其功用容後再加詳 述。註冊模組2 3 0則可接受使用者及其所指定的終端機之 註冊,以便讓使用者成為合法登錄的使用者,而其所指定 的終端機也成為合法登錄而可合法下載電子書籍的用戶終 端機。加密鑰匙產生模組2 4 0會於使用者進行註冊時產生 使用者專屬的第二加密鑰匙,也就是說不同的使用者其第 二加密鑰匙都不相同。在此需加以說明,上述之第一及第 二加密餘匙其實就是一組預定長度的數位位元,例如可以 是常用的5 6 b i t s或1 2 8 b i t s,本發明之較佳實施例之鑰 匙長度是採用128 bits或是更高的bits,以增強其安全 性。 加密模組2 5 0則是用來執行各種需要加密的動作,例 如:於文件索取程序時,加密模組2 5 0會以使用者專屬的 第二加密鑰匙對使用者購買的電子書籍加密以便後續傳送 給使用者。交易處理及查證模組2 6 0則用來處理與使用者 訂單有關的事宜,並對訂單的來源及内、容進行必要的確認 及查證工作。 資料庫2 7 0則包含至少有三個子資料庫:用戶資料庫 2 7 2、密碼資料庫2 7 4、電子文件資料庫2 7 6。用戶資料庫Page 8 486902 V. Description of the invention (5) Various utility programs for users to download to their respective terminals for free, including, for example, a compiled reading application program to provide users with login, registration, download, and reading The user operation interface of the electronic book, the reading application is attached with a first encryption key, and its function will be described in detail later. The registration module 2 30 can accept the registration of the user and the terminal designated by the user, so that the user can become a legally logged in user, and the designated terminal can also be legally registered to legally download an electronic book. User terminal. The encryption key generation module 240 generates a user-specific second encryption key when the user registers, that is, different users have different second encryption keys. It should be explained here that the first and second encryption keys mentioned above are actually a set of digital bits of a predetermined length, for example, commonly used 5 6 bits or 1 2 8 bits. The key of the preferred embodiment of the present invention The length is 128 bits or higher to enhance its security. The encryption module 250 is used to perform various actions that require encryption. For example, when the document is requested, the encryption module 250 will use the user's second encryption key to encrypt the electronic book purchased by the user so that Subsequent transmission to the user. The transaction processing and verification module 260 is used to deal with matters related to the user's order, and to make necessary confirmation and verification of the source and content of the order. Database 2 70 contains at least three sub-databases: user database 2 7 2. password database 2 7 4. electronic file database 2 7 6. User database

第9頁 五、發明說明(β) 2 7 2Φ + , 及i俘放有經過合法註冊後所有使用者相關的基本資料 用其7指定的終端機的基本資料,如··代表某一用戶之使 者識別碼。密碼資料庫2 7 4則存放使用者識別碼及其專 屬的穿一 者、j弟二加密鑰匙之間的對照表,也就是說,每一個使用 真在進行注冊時,加密錄匙產生模組2 4 0所產生相對應的 ,第二加密鑰匙就是存放在密碼資料庫274中。電子文 件責,庫2 7 6則是存放將來要提供給讀者的電子書籍的明 =舍每一本電子書籍則有一獨特的電子書碼以方便查詢與 $之用。而控制中心280則是用來控制伺服器主機丨〇2的 二:,以及處理伺服器主機1 0 2中各個模組或資料庫之控 制或資訊流向。 、 的功:::f Ξ 2 1三為本發明防盜拷電腦系統之終端機 佳= ϊ π: ΐ ί端機106為例,本發明終端機106之較 30 Λ為Λ 3ί〇承腦,其中包含一中央處理器 圯丨思肢3 2 0,一硬碟機3〇4,一 置如鍵盤3 0 8、滑鼠3 1 〇、搖桿Ή 9莖於山卡3 〇 6,輸Λ衣 3 1 4、印表機3 1 6等。為了处ώ 、 诵出裝置如螢幕 換,終端機106必須從伺服"主機1〇2進行資料交 :或網際網路104上下載經過編 ’ 之公用程式模組220 機1 0 6之記憶體3 2 0或硬碟機μ φ閱讀應用裎式3 2 2至終端 提供了使用者一登錄、註冊、中儲存。閱讀應用程式322 介面,其中並附加有第一加穷:f4、閱讀電子書籍的操作 加密檔3 2 6進行解密。即伟η 1匙3 2 4可供後續對終端機 便疋對於不同使用者而言,其所Page 9 V. Description of the invention (β) 2 7 2Φ +, and i capture the basic information of all users after the legal registration, the basic information of the terminal designated by their 7, such as ... Messenger identification code. The password database 2 7 4 stores the user ID and its unique wearer, and the comparison table between the two encryption keys, that is, each registration key generation module is used when registering Corresponding to 2 40, the second encryption key is stored in the password database 274. The electronic file is responsible, and the library 2 7 6 stores the e-books to be provided to readers in the future. Each e-book has a unique e-book code for easy inquiry and $. The control center 280 is used to control the server host 2 and the processing of the control or information flow of each module or database in the server host 102. The work of ::: f Ξ 2 1 3 is the terminal of the anti-theft computer system of the present invention = ϊ π: ΐ ί terminal 106 is taken as an example. Compared with 30 Λ of the terminal 106 of the present invention, it is Λ 3 ί. It includes a central processing unit 圯 丨 thickness 3 2 0, a hard disk drive 304, a home such as a keyboard 308, a mouse 3 1 〇, a joystick Ή 9 stem in the mountain card 3 〇, lose Λ Clothing 3 1 4 and printer 3 1 6 etc. In order to deal with devices such as screen changes, the terminal 106 must transfer data from the server "host 102: or download the compiled utility module 220 on the Internet 104 and the memory of the machine 106 3 2 0 or hard disk drive μ φ reading application mode 3 2 2 to the terminal provides users with a login, registration, and storage. Reading application 322 interface, which is added with the first plus: f4, the operation of reading electronic books. The encrypted file 3 2 6 is decrypted. That is, 1 spoon 3 2 4 can be used for subsequent terminals. For different users,

486902 五、發明說明(7) / 需要的閱讀應用程式3 2 2都是相同,因此閱讀應用程式3 2 2 是事先經過編譯完成,並可供所有需要的使用者免費任意 下載’而其中的第一加密錄匙32 4也不因使用者的不同而 有所區別。 使用者以終端機1 〇 6之閱讀應用程式為界面向遠端的 伺服器主機1 0 2進行登錄與註冊時’其程序包括1 )伺服器 主機β 1 〇 2辨識閱讀應用程式是否為合法的閱讀應用程式。 2 )伺服q器主機1 0 2運用註冊模組2 3 0產生使用者識別碼與 加密鑰匙產生模組2 4 0產生其相對應之第二加密鑰匙。3 ) 祠服為主機1 〇 2將使用者識別碼加入用戶資料庫2 7 2及第二 加密输起加入密碼資料庫2 7 4。4 )終端機1 0 6之閱讀應用 程式下戴使用者識別碼及第二加密鑰匙。每一終端機 1 0 6、1 0 8、1丨〇於註冊完成後,會產生終端機加密檔3 2 6, 終端機加密檔3 2 6中包含有使用者識別碼3 2 7、使用者之專 屬第二加密錄匙32 8與本台終端機10 6之電腦辨識碼330, 終端機1 0 6將終端機加密檔3 2 6以第一加密鑰匙3 2 4進行加 密,並以加密的形式儲存於終端機1 〇 6之記憶體3 2 0或硬碟 機3 0 4中,以避免使用者不小心更改其中的内容,也可以 減低其他人以非法的方式查看並得知其中的内容。當電子 書籍下載後並需要進i丁一解7密^時,閱讀應用程式322會對 終端機加密檔32 ^ =鑰匙3 24進行解密,以擷取出 其中的第It密鐵參與"腦辨識碼33°。486902 V. Description of the invention (7) / The required reading application 3 2 2 is the same, so the reading application 3 2 2 is compiled in advance and can be downloaded free of charge by all users who need it. An encrypted recording key 32 4 is not different for different users. When the user uses the reading application of the terminal 10 as an interface to perform registration and registration with the remote server host 10 2 'the procedure includes 1) The server host β 1 〇2 identifies whether the reading application is legitimate Read the app. 2) The server host 1 0 2 uses the registration module 2 3 0 to generate the user identification code and the encryption key generation module 2 40 to generate the corresponding second encryption key. 3) Ancestral clothing is the host 10. Add the user identification code to the user database 2 72 and the second encryption input to the password database 2 7 4. 4) The reading application of the terminal 10 6 is worn by the user Identification code and second encryption key. After the registration of each terminal 106, 108, 1 丨 〇, a terminal encrypted file 3 2 6 will be generated, and the terminal encrypted file 3 2 6 contains the user identification code 3 2 7. User The exclusive second encrypted recording key 32 8 and the computer identification code 330 of this terminal 10 6, the terminal 10 6 encrypts the terminal encrypted file 3 2 6 with the first encryption key 3 2 4 and the encrypted The form is stored in the memory 3 2 0 of the terminal 1 06 or the hard disk drive 3 0 4 to prevent the user from accidentally changing the content therein, and it can also reduce others from viewing and knowing the content illegally. . When the e-book is downloaded and needs to be unlocked, the reading application 322 decrypts the encrypted file 32 ^ = key 3 24 of the terminal to extract the It ’s dense iron participation " brain recognition Code 33 °.

第11頁 486902 五、發明說明(8) 現在針對本發明之方法作一詳細說明,配合本發明防 盜拷電腦系統1 0 0之方法包含有一註冊程序與一文件索取 程序。當一使用者想要利用本發明之電腦系統1 0 0進行電 子書籍的購買之前,首先要從伺服器主機1 0 2或網際網路 10 4上的網路書店下載閱讀應用程式3 2 2,並於閱讀應用程 式3 2 2中向伺服器主機1 0 2執行一註冊程序以成為一合法登 錄的使用者或是會員,閱讀應用程式3 2 2中除了包含一般 性的介面應用程式之外,還包含上述之第一加密鑰匙 3 2 4。在註冊的同時,不但使用者需要經過註冊,使用者 將來所欲下載電子書籍的終端機1 0 6也需要經過註冊,也 就是說在註冊的過程中,相關之使用者基本資料(包括使 用者辨識碼和其相對應的第二加密鑰匙3 2 8 )會經過註冊而 儲存在伺服器主機1 〇 2中。而使用者也必須以註冊當時所 使用的終端機1 0 6作為將來下載電子書籍的電子閱讀裝 置,否則,電腦系統1 0 0會判定所使用來下載電子書籍的 電子閱讀裝置未經過註冊,而無法正常開啟所下載的電子 書籍。 當使用者利用終端機1 0 6中的閱讀應用程式3 2 2進行註 冊時,伺服器主機1 0 2會將使用者辨識碼儲存於用戶資料 庫2 7 2中,然後指定一專屬的第二加密鑰匙3 2 8給使用者, 並且將使用者與其第二加密鑰匙3 2 8之間的一對一對照關 係儲存於密碼資料庫2 74中,如此便完成了使用者及其終 端機1 0 6的合法註冊。在完成註冊後,伺服器主機1 〇 2會以Page 11 486902 V. Description of the invention (8) The method of the present invention will now be described in detail. The method for cooperating with the anti-theft computer system 100 of the present invention includes a registration program and a file requesting program. Before a user wants to use the computer system 100 of the present invention to make an electronic book purchase, the user must first download a reading application 3 2 2 from an Internet bookstore on the server host 102 or the Internet 104. And in the reading application 3 2 2 execute a registration procedure to the server host 102 to become a legally logged in user or member. In addition to the general interface application, the reading application 3 2 2 It also contains the first encryption key 3 2 4 described above. At the same time of registration, not only does the user need to be registered, but the terminal 1 06 that the user wants to download electronic books in the future also needs to be registered. That is to say, during the registration process, relevant basic user information (including the user) The identification code and its corresponding second encryption key 3 2 8) will be registered and stored in the server host 102. The user must also use the registered terminal device 106 at that time as the electronic reading device for downloading electronic books in the future, otherwise, the computer system 100 will determine that the electronic reading device used for downloading electronic books is not registered, and The downloaded e-book cannot be opened normally. When the user uses the reading application 3 2 2 in the terminal 10 to register, the server host 10 2 stores the user identification code in the user database 2 7 2 and then assigns an exclusive second The encryption key 3 2 8 is given to the user, and the one-to-one comparison relationship between the user and his second encryption key 3 2 8 is stored in the password database 2 74, thus completing the user and his terminal 1 0 6 legal registrations. After completing the registration, the server host 102 will start with

486902 、發明說明(9) 五 第 密鑰匙將使用者辨識碼3 加密输匙328加t,並傳逆j射應咸使用者之專 _、用程式在接收到加密I & /端機1 06 ’而終端機 f % 後,合先以笛 使用者辨識碼3 2 7與第 二加密;;!:將解3密\之;加密輪起將兩者進行解 密,而後 y ^ 吏用者辨識碼與第二加密铃匙 連同代表該辨人識碼再一併…形成 機加密檔3 2 6’亚儲存於^;亥合法註冊之終端機中,經過此 /註冊程序’以後終端機1〇6就可合法下載電子書籍並對 其ja球解洽、了486902 、 Invention description (9) The fifth key will encrypt the user identification code 3, the encryption key 328 plus t, and transmit the user's special code, and receive the encryption I & / terminal 1 06 'And after the terminal f%, the first encryption with the user ID 3 2 7 and the second encryption ;; : Will decrypt 3 secrets \ one; the encryption round will decrypt the two, and then y ^ the user identification code and the second encryption bell key together with the representative identification code together to form a machine encrypted file 3 2 6 ' Asia is stored in the legally registered terminal. After this / registration procedure, the terminal 106 can legally download the electronic book and disassociate it with the ja ball.

請參閱圖四,圖四為本發明防盜拷電腦系統於註冊程 序時之流程圖。將上述註冊程序以流程圖4 0 0表示如下列 杏驟: 少驟4 〇 2 :開始; 夕驟4 〇 4 ·使用者選疋一終端機1 0 6以進行後續註冊程 序,介驟4〇 6:從網際網路104上下載閱讀應用程式3 2 2到 y /々地機1 0 6 ·’ 定的終知 ^ 丧驟4 〇 8 :由終端機1 0 6的閱讀應用程式3 2 2連接伺服 努主i 進行註冊二 介驟4丨〇 ··伺服器主機1 〇 2產生使用者辨識碼及專屬的Please refer to FIG. 4, which is a flowchart of the anti-theft computer system of the present invention during the registration process. The above-mentioned registration procedure is represented by the flow chart 400 as follows: less step 4 〇2: start; evening step 4 〇 · the user selects a terminal 106 for subsequent registration procedures, step 4〇 6: Download the reading application 3 2 2 from the Internet 104 to y / ground machine 1 0 6 · 'Finally known ^ Funeral 4 〇 8: Reading application 3 1 2 by the terminal 1 6 Connect the server and host i to perform registration 2 丨 〇 · Server host 1 〇 Generate user identification code and exclusive

广一 ^寅鑰匙328並分別儲存於用戶資料庫2 72與密碼資料 第二加b⑻ 、 庫2 驟4丨2 :祠服器主機102將產生的使用者辨識碼327Guangyi ^ key 328 and stored in the user database 2 72 and the password data respectively. Second addition b⑻, bank 2 Step 4 丨 2: The user identification code 327 generated by the temple server host 102

486902 五、發明說明(10) % 3 2 4加密後傳 及其專屬的第二加密鑰匙32 8以第一加密鑰a 送至終端機106; 第一加密鑰匙 步驟4 1 4 :終端機1 0 6之閱讀應用程式以 & q 9 s、隹许 將接收到加密的使用者辨識碼3 2 7與第二加冰^ 解密; , 〃經突後之使用 步驟4 1 6 :終端機1 0 6之閱讀應用程式將解山 者辨識碼3 2 7與第二加密鑰匙3 2 8連同代表終端機.之“ 月自辨識碼3 3 0再一併加密以形成一終端機力口密福3 Y 6六奋 步騍4 1 8 :終端機1 〇 6之閱讀應用程式將終端機加搶才當 3 2 6儲存於其硬碟中;486902 V. Description of the invention (10)% 3 2 4 The encrypted encrypted transmission and its exclusive second encryption key 32 8 are sent to the terminal 106 with the first encryption key a; the first encryption key step 4 1 4: the terminal 1 0 The reading application of 6 uses & q 9 s, and promises to decrypt the encrypted user identification code 3 2 7 and the second plus ice ^; decryption, use the step 4 1 6: terminal 1 0 The reading application of 6 will encrypt the mountain solver identification code 3 2 7 and the second encryption key 3 2 8 together with the representative terminal. The "monthly self-identification code 3 3 0" will be encrypted together to form a terminal power mouth secret 3 Y 6 Six Struggles 4 1 8: The reading application of the terminal 1 06 will grab the terminal and store it as 3 2 6 in its hard disk;

步·驟4 2 〇 ··結束。Step 4 2 0 ·· End.

當使用耆及其終端機1 0 6於伺服器主機1 0 2端完成註冊 後,就可以依其個人意願於任何時候上網付費購買特定的 電子書籍,旅且將其下載至終端機1 〇 6,這/部份也就是 本發明方法所稱之文件索取程序。使用者玎從經過註冊之 終端機於網際網路1 0 4中瀏覽網路書店或相關網站,進行 搜尋並且決定購買某一本電子書籍,而將購買訂單傳送至 伺服器主機1〇2,伺服器主機102在進行必要的確認及查證 後,會於電子文件資料庫2 7 6中調出使用者想購買的電子 ,籍的明文,于且於密碼資料^庫274中調出使用者專屬之 =二加密鑰匙=,之後以此第二加密錄匙3 2 8對電子書籍 =應再將密文經由網際網路After using 耆 and its terminal 10 to complete registration on the server host 102, you can purchase specific e-books online at any time according to his personal wishes, and download them to the terminal 1 06 This / part is the so-called document requesting procedure in the method of the present invention. The user: browses an online bookstore or related website from the registered terminal on the Internet 104, searches for and decides to purchase an e-book, and sends the purchase order to the server host 102, the server After the host computer 102 performs the necessary confirmation and verification, it will call the electronic document database 2 7 6 for the user's desired purchase, the plain text, and call the user-specific information in the password data library 274. = Two encryption keys =, then use this second encryption recording key 3 2 8 pairs of electronic books = The cipher text should be passed through the Internet again

486902 五、發明說明 μ的::t機之閱讀應用程式3 2 2接收到所購買電子書 精f 日守’曰先以閱讀應用程式3 2 2中附屬的第一加密 鑰匙3 2 4對終端機加宓# q 9⑽〜甘士 斤 在檔3 2 6解密,以取得其中之第二加密 鑰匙3 2 8與電知辨識螞3 3 〇,然後閱讀應用程式3 2 2會對解 密所取得之電細辨識碼3 3 〇與目前終端機1 〇 6之電腦辨識碼 3 1 8進行比對。當比對結果相同時,代表目前終端機1 6 經過合法註冊之終端機,閱讀應用程式3 2 2會繼續以解穷… 所取得之第二加密鑰匙3 2 8對接收到的密文解密,使 = 就可以在閱讀應用程式3 2 2所提供的介面下閱讀解资、尚/ 的電子書籍。 、在過後 閱讀應用程式3 2 2對解密所取得之電腦辨=、 端機1 0 6之電腦辨識碼3 1 8進行比對後發$識焉3 3 0與 時,代表目前終端機1 0 6並未經過合法\^^&對結果 ^ Ί ° i 閱讀 當 目前終 不相同 應用程 二加密 閱讀電 法使用 應用程 的終端 他電腦 散佈」 式32 2連同其購買的電子書籍以及於註册’士 ^力口密檔3 2 6〆併拷貝至另一台電腦上,~所產生 ^的第三人閱讀’也就是所謂的「合、去乂便給其 上 蹲買卻非法 式3 2 2即停止後續動作,也不會如正常卜冊’閱讀 ^匙3 2 8對收刻的密文解密,因此使用^形般以第 子:f籍。這種情形會發生的最可能原因,也3就無法 者於合法註冊的終端機下載電子書籍後,^ 一個合 ^ S 2 2連同其購買的電子書籍以及於兮加’部將閱讀486902 V. Description of the invention μ :: The reading application 3 of the machine t 2 2 received the purchased e-book essence f Rishou 'said that the first encryption key 3 2 4 attached to the reading application 3 2 2机 加 宓 # q 9⑽ ~ Gan Shijin decrypts in the file 3 2 6 to obtain the second encryption key 3 2 8 and Dianzhi Ma 3 3 〇, then read the application 3 2 2 to decrypt the obtained The electrical identification code 3 3 0 is compared with the current computer identification code 3 1 8 of the terminal 1 106. When the comparison result is the same, it means that the current terminal 16 is a legally registered terminal, and the reading application 3 2 2 will continue to de-poor ... The second encryption key 3 2 8 obtained decrypts the received ciphertext, Use = to read the e-books of XieZhang and Shang / under the interface provided by the reading application 3 2 2. Afterwards, read the application 3 2 2 to identify the computer obtained from the decryption =, compare the computer identification code 3 1 8 of the terminal 1 0 6 and send $ I 焉 3 3 0 and the time, which represents the current terminal 1 0 6 has not passed the legal \ ^^ & result ^ Ί ° i reading is currently different applications 2 encrypted reading electronically using the terminal of the application to distribute it on a computer ”Formula 32 2 together with the e-books it purchased and the registration 'Shi ^ Likou secret file 3 2 6〆 and copy it to another computer, ~ produced by a third person to read', which is the so-called "combined, go to buy it and squat to buy it but illegal 3 2 2 is to stop the follow-up actions, and it will not decrypt the received ciphertext as in the normal book 'Read ^ spoon 3 2 8', so use the ^ form as the first: f. The most likely cause of this situation, 3 ca n’t download e-books on a legally registered terminal, ^ a combination ^ S 2 2 together with the e-books they purchased and Yu Xijia ’s Department will read

第15頁 486902 五、發明說明(’12) 然而,由於本發明之閱讀應用程式3 2 2對電子書籍解 密前,會先對終端機加密檔3 2 6中所取得的電腦辨識碼3 3 0 與目前解密工作所在電腦之電腦辨識碼3 1 8進行比對,而 取得一個比對的結果。如果目前解密工作所在電腦與註冊 當時之終端機是同一電腦,此一比對結果自然會相同,即 表示代表目前解密工作所在電腦為經過合法註冊之終端 機,電子書籍並未被非法散佈至其他未經合法註冊的電腦 中,於是閱讀應用程式3 2 2會繼續以解密讓使用者可以閱 讀解密過後的電子書籍。如果目前解密工作所在電腦與註 冊當時之終端機不相同時,此一比對結果自然不相同,即 表示代表目前解密工作所在電腦並未經過合法註冊,也就 是說,電子書籍已經被非法散佈至其他未經合法註冊的電 腦中,於是閱讀應用程式3 2 2會停止解密的步驟,使用者 即使取得非法散佈的電子書籍也無法進行解密閱讀。 請參閱圖五,圖五A為本發明防盜拷電腦系統在文件 索取程序時於伺服器主機端之流程圖,圖五B為本發明防 盜拷電腦系統在文件索取程序時於終端機之流程圖。將上 述文件索取程序以流程圖5 0 0表示如下列步驟: 步驟5 0 2 :開始; 步驟504:使用者於網路書店中決定購買某一本電子 書籍; 步驟5 0 6 ··伺服器主機1 0 2處理購買訂單並進行必要的 確認及查證;Page 15 486902 V. Description of the invention ('12) However, before the reading application 3 2 2 of the present invention decrypts an electronic book, the terminal will first encrypt the computer identification code 3 2 6 obtained in the file 3 2 6 Compare with the computer identification code 3 1 8 of the computer where the decryption work is currently performed, and obtain a comparison result. If the computer where the decryption job is currently located is the same computer as the terminal at the time of registration, this comparison will naturally be the same, which means that the computer where the decryption job is currently located is a legally registered terminal, and the electronic books have not been illegally distributed to other On a computer that has not been legally registered, the reading application 3 2 2 will continue to decrypt to allow the user to read the decrypted e-book. If the computer where the decryption job is currently located is different from the terminal at the time of registration, the result of this comparison is naturally different, which means that the computer where the decryption job is currently located has not been legally registered, that is, the electronic books have been illegally distributed to On other computers that have not been legally registered, the reading application 3 2 2 will stop the decryption step, and users will not be able to decrypt and read even if they obtain illegally distributed electronic books. Please refer to FIG. 5. FIG. 5A is a flowchart of the anti-theft computer system of the present invention on the server host during a document requesting process, and FIG. 5B is a flowchart of the anti-theft computer system of the present invention on a terminal during a document requesting process . The above-mentioned document requesting procedure is represented by the flowchart 5 0 0 as follows: Step 5 0 2: Start; Step 504: The user decides to purchase an e-book in the online bookstore; Step 5 6 ·· Server host 1 0 2 Process the purchase order and perform necessary confirmation and verification;

第16頁 486902 五、發明說明(’13) 步驟5 0 8 :訂單是否通過查證?是,到步驟5 1 2 “否, 到步驟5 1 0 ; 步驟5 1 0 :拒絕接受此次訂單並立即停止交易;到步 驟 5 4 0 ; 步驟5 1 2 :於電子文件資料庫2 7 6中調出購買的電子書 籍的明文; 步驟5 1 4 :於密碼資料庫2 7 4中調出使用者專屬之第二 加密鑰匙3 2 8 ; 步驟5 1 6 :以此第二加密鑰匙3 2 8對電子書籍的明文加 密以形成相對應之密文; 步驟5 1 8 :將密文經由網際網路1 0 4傳送至終端機 106; 步驟5 2 0 :終端機1 0 6之閱讀應用程式3 2 2以第一加密 鑰匙3 2 4對終端機加密檔3 2 6解密; 步驟5 2 2 :解密後取得第二加密鑰匙3 2 8與電腦辨識碼 3 3 0 ; 步驟5 2 4 :取得目前工作所在電腦之電腦辨識碼3 1 8 ; 步驟5 2 6 :閱讀應用程式3 2 2對解密所取得之電腦辨識 碼3 3 0與目前電腦之電腦辨識碼3 1 8進行比對; 步驟5 2 8 :比對結果是否相同?是,到步驟5 3 0 ;否, 到步驟5 3 6 ;Page 16 486902 V. Description of the invention (’13) Step 5 0 8: Has the order been verified? Yes, go to step 5 1 2 "No, go to step 5 1 0; step 5 1 0: refuse to accept the order and stop trading immediately; go to step 5 4 0; step 5 1 2: in the electronic file database 2 7 6 Call the plaintext of the purchased e-book; Step 5 1 4: Call the user-specific second encryption key 3 2 8 from the password database 2 7 4; Step 5 1 6: Use this second encryption key 3 2 8 Encrypt the plain text of the electronic book to form the corresponding cipher text; Step 5 1 8: Send the cipher text to the terminal 106 via the Internet 104; Step 5 2 0: The reading application of the terminal 106 3 2 2 Use the first encryption key 3 2 4 to decrypt the terminal encrypted file 3 2 6; Step 5 2 2: Obtain the second encryption key 3 2 8 and computer identification code 3 3 0 after decryption; Step 5 2 4: Get The computer identification code 3 1 8 of the computer on which the current work is located; Step 5 2 6: Read the application program 3 2 2 to compare the computer identification code 3 3 0 obtained from the decryption with the computer identification code 3 1 8 of the current computer; step 5 2 8: Are the comparison results the same? Yes, go to step 5 3 0; No, go to step 5 3 6;

步驟5 3 0 :目前終端機1 0 6已確認經過合法註冊; 步驟5 3 2 ··閱讀應用程式3 2 2以第二加密鑰匙3 2 8對接 收到的電子書籍密文解密;Step 5 3 0: The current terminal 10 has been confirmed to be legally registered. Step 5 3 2 ·· Read the application 3 2 2 with the second encryption key 3 2 8 to decrypt the received electronic book ciphertext;

第17頁 486902 五、發明說明(14) 步驟5 3 4 :使用者可以閱讀解密過後的電子書籍;到 步驟5 4 0 ; 步驟5 3 6 :目前終端機未經過合法註冊; 步驟5 3 8 :閱讀應用程式3 2 2停止解密動作; 步驟5 4 0 :結束。 本發明上述之較佳實施例是以私鑰密碼系統為例加以 說明,也就是說對電子書籍加密解密用的是同一把加密鑰 匙,除了資料傳輸之雙方外,其他第三人並不知道加密鑰 匙的内容為何,因此也稱為對稱型的密碼系統,如美國國 家標準局所公佈的DES演算法,或是Lai及Massey所設計的 I D E A演算法,其安全性較強,加解密時運算速度也較快。 然而,本發明之電腦系統1 0 0同樣也可採用公開金鑰密碼 系統來對電子書籍加密與解密,也就是說每一個使用者會 擁有一把可以公佈出來的公開金錄,與一把自己保留不能 洩漏的私有金鑰,當伺服器主機1 0 2之加密模組2 5 0對電子 書籍加密時,用的是使用者的公開金鑰,而當閱讀應用程 式3 2 2對接收到的電子書籍密文進行解密時,用的是使用 者的私有金输。 與習知技術相比較,本發明防盜拷電腦系統10 0之優 點在於: 一、不同使用者或終端機所需要的閱讀操作平台都是 相同的。由於所有使用者都是經由閱讀應用程式3 2 2與伺Page 17 486902 V. Description of the invention (14) Step 5 3 4: The user can read the decrypted electronic book; go to step 5 40; step 5 36: the terminal is not legally registered at present; step 5 3 8: Read the application 3 2 2 to stop the decryption action; Step 5 4 0: End. The above-mentioned preferred embodiment of the present invention is described by using a private key cryptosystem as an example. That is to say, the same encryption key is used to encrypt and decrypt electronic books. Except for both parties of data transmission, other third parties do not know the encryption. What is the content of the key, so it is also called a symmetric cryptosystem, such as the DES algorithm announced by the US National Bureau of Standards, or the IDEA algorithm designed by Lai and Massey. It has strong security, and the speed of encryption and decryption operations Faster. However, the computer system 100 of the present invention can also use the public key cryptosystem to encrypt and decrypt electronic books, that is, each user will have a public gold record that can be published, and one Keep the private key that cannot be leaked. When the encryption module 2 50 of the server host 102 encrypts the electronic book, the public key of the user is used, and when the reading application 3 2 2 receives the received When decrypting the e-book ciphertext, the user's private gold is used. Compared with the conventional technology, the advantages of the anti-theft computer system 100 of the present invention are as follows: 1. The reading operation platforms required by different users or terminals are the same. Since all users read the application 3 2 2 and wait

第18頁 486902 五、發明說明(15) 服器主機1 0 2進行註冊及文件索取的程序,閱讀應用程式 ' 3 2 2則成為一閱讀操作平台,以提供使用者與伺服器主機 . 1 0 2溝通的橋樑,閱讀應用程式3 2 2及其中之第一加密鑰匙 3 2 4都是事先經過編譯完成而可供使用者免費下載或拷貝 至任何機器上。由於本發明電腦系統的目的之一在於防止 電子書籍推廣時所可能造成的阻卻事由,也就是防止電子 書籍的非法散佈,而不在於防止閱讀應用程式3 2 2本身的 散佈,同時由於本發明防止電子書籍非法散佈的機制主要 並不在於閱讀應用程式3 2 2本身,因此,閱讀應用程式3 2 2 經由使用者大量的下載、拷貝或散佈不但不會影響本發明 之目的,反而有助於推銷電子書籍的概念給使用者,使電 子書籍的使用能加速普及。 · 二、使用者在為其所指定的終端機註冊時,伺服器主 機1 0 2之加密鑰匙產生模組2 4 0會產生一專屬於使用者的第 二加密鑰匙。當使用者購買某一本電子書籍時,加密模組 2 5 0會以此第二加密鑰匙3 2 8對電子書籍的明文加密以形成 相對應之密文,傳送至使用者所在之終端機上,而終端機 上之閱讀應用程式3 2 2在確認目前終端機經過合法註冊 後,始再以第二加密鑰匙3 2 8對接收到的電子書籍密文解 密。由於某些先前技術對不同使用者購買的電子書籍都以 相同的加密錄匙作加解密,一旦此一加密输匙被破解,則 0 :所有電子書籍的密文都可以正確被還原成明文;然而本發 :. 明針對每一使用者都有專屬的第二加密鑰匙,因此即使某Page 18 486902 V. Description of the invention (15) The server host 1 0 2 performs registration and document requesting procedures, and the reading application program '3 2 2 becomes a reading operation platform to provide users and server hosts. 1 0 2 The bridge of communication, the reading application 3 2 2 and the first encryption key 3 2 4 are compiled in advance and can be downloaded or copied to any machine for free by users. As one of the objectives of the computer system of the present invention is to prevent possible hindrances during the promotion of electronic books, that is, to prevent the illegal distribution of electronic books, and not to prevent the distribution of reading application programs 3 2 2 itself, and because of the invention The mechanism for preventing the illegal distribution of electronic books is not mainly in the reading application 3 2 2 itself. Therefore, the reading application 3 2 2 is downloaded, copied or distributed by users in large quantities, which will not affect the purpose of the present invention, but will help Promote the concept of electronic books to users, so that the use of electronic books can accelerate their popularity. · 2. When the user registers for the terminal specified by him, the encryption key generation module 24 of the server host 102 will generate a second encryption key that is unique to the user. When a user purchases an e-book, the encryption module 2 50 will encrypt the plain text of the e-book with the second encryption key 3 2 8 to form the corresponding cipher text, and send it to the terminal where the user is After confirming that the terminal is legally registered, the reading application 3 2 2 on the terminal decrypts the received electronic book ciphertext with the second encryption key 3 2 8. Because some previous technologies use the same encryption key to encrypt and decrypt electronic books purchased by different users, once this encryption key is cracked, 0: the ciphertext of all electronic books can be correctly restored to plaintext; However, this issue:. Ming has a dedicated second encryption key for each user, so even if a

第19頁 486902 五、發明說明C16) 一使用者的第二加密鑰匙被破解,仍然無法閱讀其他使用 者所購買之電子書籍,因此可提高系統的安全性。 三、 終端機加密檔以加密之形式儲存於終端機中,可 避免使用者不小心更改其中的内容,也可以減低其他人以 非法的方式查看並得知其中的内容。 四、 終端機加密檔儲存於終端機,有助於簡化因電腦 辨識碼上傳所帶來的隱私權公開時需使用者同意之複雜程 序。由於本發明於認證終端機是否經合法註冊所需要的電 腦辨識碼,是借用其中t央處理器之辨識碼、硬碟機之辨 識碼或是網路卡之辨識碼等為之,而這些辨識碼的資料依 法是視為使用者個人隱私資料之一部份,伺服器主機1 〇 2 對於使用者所提出任何這類辨識碼之取得都要經過使用者 的同意,因此,只要伺服器主機1 0 2想取得終端機的電腦 辨識碼都無法規避使用者同意的程序,於是在認證終端機 是否經合法註冊的程序上原本應該會變得較為複雜。然 而,依據本發明之設計,當使用者在為其所指定的終端機 註冊時,下傳之使用者辨識碼與第二加密鑰匙在解密後, 會連同代表該終端機之電腦辨識碼會以第一加密鑰匙加密 而產生相對應的終端機加密檔,因此在註冊程序進行過程 中,並不需將電腦辨識碼上傳給伺服器主機1 0 2。因此當 終端機接收到使用者所購買電子書籍之密文時,其所執行 i之後續認證程序所需之電腦辨識碼是註冊時就直接儲存於Page 19 486902 V. Description of the invention C16) The second encryption key of a user is cracked, and the electronic books purchased by other users cannot be read, so the security of the system can be improved. 3. The encrypted file of the terminal is stored in the terminal in an encrypted form, which can prevent users from accidentally changing its content, and it can also reduce others from viewing and knowing its contents in an illegal way. 4. The encrypted file of the terminal is stored in the terminal, which helps to simplify the complicated procedures that require the user's consent when the privacy rights brought about by the upload of the computer identification code are disclosed. Since the computer identification code required by the present invention for authenticating the terminal is legally registered, the identification code of the central processing unit, the identification code of the hard disk drive, or the identification code of the network card is borrowed, and these identifications The data of the code is considered as part of the user's personal privacy data. The server host 1 02 must obtain the user ’s consent to obtain any such identification code proposed by the user. Therefore, as long as the server host 1 0 2 There are no procedures for obtaining the computer identification code of the terminal to avoid the user's consent. Therefore, the procedure for authenticating whether the terminal is legally registered should have become more complicated. However, according to the design of the present invention, when a user registers for a terminal designated by him, the user identification code and the second encryption key transmitted after decryption will be decrypted together with the computer identification code representing the terminal. The first encryption key is encrypted to generate a corresponding terminal encrypted file. Therefore, it is not necessary to upload the computer identification code to the server host 102 during the registration process. Therefore, when the terminal receives the cipher text of the electronic book purchased by the user, the computer identification code required for the subsequent authentication process performed by i is directly stored in the registration.

486902 五、發明說明(17) 終端機中,因此目前工作終端機之電腦辨識碼自然也不必 上傳至伺服器主機1 〇 2,而可以直接在終端機中進行比較 及認證的工作,自然簡化了因電腦辨識碼上傳所會帶來的 隱私權公開需要使用者同意之複雜程序及可能的爭議。 五、利用終端機加密檔3 2 6中所取得的電腦辨識碼3 3 0 與目前解密工作所在電腦之電腦辨識碼31 8進行比對,可 防止「合法購買卻非法散佈」之情事。由於本發明之閱讀 應用程式3 2 2對電子書籍解密前,會先對終端機加密檔3 2 6 中所取得的電腦辨識碼3 3 0與目前解密工作所在電腦之電 腦辨識碼3 1 8進行比對,以確認目前解密工作所在電腦與 註冊當時之終端機是同一電腦,其次再決定並閱讀應用程 式3 2 2是否會繼續進行電子書籍密文的解密工作。因此, 即使電子書籍的密文被非法散佈至其他未經合法註冊的電 腦中,閱讀應用程式3 2 2會停止解密的步驟,使非法散佈 的電子書籍無法正確解密而無法進行閱讀。 綜上所述,本發明電腦系統提出了一種有效的機制, 來防止非經合法註冊之終端機對電子文件之盜拷,因而遏 阻「合法購買卻非法散佈」的情形,使得電子書籍的經銷 商因可維持合理的利潤而願意投入於書籍電子化買賣的行 列當中,因此使得電子書籍之環保性、效率性、傳播性、 經濟性等多重優點可為全民所共享。486902 V. Description of the invention (17) In the terminal, the computer identification code of the current working terminal naturally does not have to be uploaded to the server host 102, but can be directly compared and authenticated in the terminal, which naturally simplifies the work. The disclosure of privacy rights due to the upload of computer identification codes requires complicated procedures and possible disputes that require user consent. V. Using the computer identification code 3 3 0 obtained in the encrypted file 3 2 6 of the terminal to compare with the computer identification code 3 1 8 of the computer where the decryption work is currently performed can prevent the situation of "legal purchase but illegal distribution". Because the reading application 3 2 2 of the present invention decrypts the electronic book, the computer identification code 3 3 0 obtained from the encrypted file 3 2 6 of the terminal is first performed with the computer identification code 3 1 8 of the computer where the decryption work is currently performed. Compare to confirm that the computer where the decryption is currently performed is the same computer as the terminal at the time of registration, and then determine and read whether the application 3 2 2 will continue to decrypt the ciphertext of the electronic book. Therefore, even if the cipher text of the electronic book is illegally distributed to other computers that are not legally registered, the reading application 3 2 2 will stop the decryption step, so that the illegally distributed electronic book cannot be correctly decrypted and cannot be read. In summary, the computer system of the present invention proposes an effective mechanism to prevent unauthorized copying of electronic files by terminals that have not been legally registered, thus curbing the situation of "legitimate purchase but illegal distribution", and the distribution of electronic books Businesses are willing to invest in the electronic book trading because they can maintain reasonable profits, so the multiple advantages of environmental protection, efficiency, dissemination, and economics of electronic books can be shared by the entire people.

486902 五、發明說明(18) 以上所述僅為本發明之較佳實施例,凡依本發明申請 專利範圍所做之均等變化與修飾,皆應屬本發明專利之涵 蓋範圍。486902 V. Description of the invention (18) The above description is only a preferred embodiment of the present invention. Any equivalent changes and modifications made in accordance with the scope of the patent application for the present invention shall fall within the scope of the invention patent.

第22頁 486902 圖式簡單說明^ 圖式之簡單說明 。 圖一為本發明可防止電子文件盜拷之電腦系統之示意 圖。 圖二為本發明防盜拷電腦系統之伺服器主機的功能方 塊圖。 圖三為本發明防盜拷電腦系統之終端機的功能方塊圖 圖四為本發明防盜拷電腦系統於註冊程序時之流程 圖。 圖五A為本發明防盜拷電腦系統在文件索取程序時於 伺服器主機端之流程圖。 圖五B為本發明防盜拷電腦系統在文件索取程序時於 用戶終端機之流程圖。 圖示之符號說明 100 防 盜 拷 電 腦 系 統 102 伺 服 器 主 機 103 防 火 牆 裝 置 104 網 際 網 路 1 06 > 108, • 1 10 終 端機 210 介 面 模 組 220 公 用 程 式 模 組 230 註 冊 模 組 240 加 密 输 匙 產 生 模 組 250 加 密 模 組 260 交 易 處 理 及 查 證 模組 270 資 料 庫 272 用 戶 資 料 庫 274 密 石馬 資 料 庫 276 電 子 文 件 資 料 庫Page 22 486902 Simple illustration of the drawing ^ Simple illustration of the drawing. FIG. 1 is a schematic diagram of a computer system capable of preventing electronic files from being stolen. Figure 2 is a functional block diagram of the server host of the anti-theft computer system of the present invention. Figure 3 is a functional block diagram of the terminal of the anti-theft computer system of the present invention. Figure 4 is a flowchart of the anti-theft computer system of the present invention during the registration process. FIG. 5A is a flowchart of the anti-theft computer system of the present invention on the host side of the server during a document retrieval process. Fig. 5B is a flow chart of the anti-theft computer system of the present invention on a user terminal when a file requesting procedure is performed. Explanation of Symbols 100 Anti-theft computer system 102 Server host 103 Firewall device 104 Internet 1 06 > 108, • 1 10 Terminal 210 Interface module 220 Utility module 230 Registration module 240 Encryption key generation Module 250 Cryptographic Module 260 Transaction Processing and Verification Module 270 Database 272 User Database 274 Dense Horse Database 276 Electronic Document Database

第23頁 486902 圖式簡單說明 280 控 制 中心 302 中 央 處 理 器 304 硬 碟 機 306 網 路 卡 308 鍵 盤 310 滑 鼠 312 榣 桿 314 螢 幕 316 印 表 機 318 目 前 工作終端 機之電腦辨 識碼 320 1己 憶 體 322 閱 讀 應 用 程 式 324 第 一 加密錄匙 326 終 端 機 加 密 檔 327 使 用 者識別碼 328 第 二 加 密 錄 匙 330 電 腦 辨識碼Page 23 486902 Brief description of the diagram 280 Control center 302 Central processing unit 304 Hard disk drive 306 Network card 308 Keyboard 310 Mouse 312 Pole 314 Screen 316 Printer 318 Computer identification code of the current working terminal 320 1 Body 322 Read application 324 First encrypted recording key 326 Terminal encrypted file 327 User identification code 328 Second encrypted recording key 330 Computer identification code

第24頁Page 24

Claims (1)

486902 六、申請專利旄圍 1. 一種使用於一電腦系統中可防止電子文件盜拷之方 法,該電腦系統包含有一伺服器主機可經由一網際網路以 與複數個終端機相連接,每一終端機並具有至少一代表該 終端機之辨識碼,一終端機可經由該網際網路向該伺服器 主機提出索取一電子文件之要求,該伺服器主機則可將該 電子文件之明文經過加密形成相對應之密文,並經由該網 際網路傳送至該終端機,以將該密文解密為原來之明文, 該方法包含有一註冊程序與一文件索取程序’該註冊程序 包含有下列步驟: 使用者載入一閱讀應用程式於一終端機中,該閱讀應 用程式並包含一第一加密鑰匙; 使用者利用該閱讀應用程式向該伺服器主機註冊成為 一合法之終端機; 該伺服器主機在完成該終端機之合法註冊後,會產生 一使用者辨識碼與一使用者專屬之第二加密鑰匙,該使用 者辨識碼與該第二加密鑰匙並會經過加密後傳送至該合法 註冊之終端機;以及 該終端機之閱讀應用程式並會進一步將接收到之使用 者辨識碼與第二加密鑰匙連同代表該終端機之辨識碼一併 加密以形成一終端機加密檔,以儲存於該合法註冊之終端 :機中; · 該文件索取程序包含有下列步驟: 當一終端機向該伺服器主機提出索取一電子文件之要 求時,該伺服器主機則會將該電子文件之明文經過該第二486902 VI. Applying for patent protection 1. A method for preventing electronic files from being stolen in a computer system, the computer system includes a server host computer which can be connected to a plurality of terminals via an Internet, each The terminal has at least one identification code representing the terminal. A terminal can request the server host for an electronic file through the Internet, and the server host can encrypt the plain text of the electronic file to form The corresponding ciphertext is transmitted to the terminal via the Internet to decrypt the ciphertext into the original plaintext. The method includes a registration procedure and a document request procedure. The registration procedure includes the following steps: using The reader loads a reading application into a terminal, and the reading application includes a first encryption key; the user uses the reading application to register with the server host as a legitimate terminal; the server host is at After the legal registration of the terminal is completed, a user identification code and a user-specific second encryption will be generated Key, the user identification code and the second encryption key will be encrypted and transmitted to the legally registered terminal; and the reading application of the terminal will further encrypt the received user identification code and the second encryption The key is encrypted together with the identification code representing the terminal to form a terminal encrypted file, which is stored in the legally registered terminal: machine; The file request procedure includes the following steps: When a terminal goes to the server When the host asks for an electronic document, the server host passes the clear text of the electronic document through the second 486902 六、申請專利m圍 加密鑰匙之加密而形成相對應之密文,並將該密文經由該 網際網路傳送至該終端機; 當該終端機之閱讀應用程式接收到該密文時,會先以 該第一加密鑰匙對該終端機加密檔解密,並取得其中之第 二加密鑰匙與該終端機之辨識碼;以及 當該閱讀應用程式比較所取得之終端機辨識碼與目前 終端機之辨識碼為相同時,即以該第二加密鑰匙對該接收 到的密文解密,否則即停止後續之解密動作,以防止非合 法之終端機對該電子文件之盜拷。 2. 如申請專利範圍第1項之方法,其中該終端機另包含 一中央處理器、一硬碟機以及一網路卡,而該終端機之辨 識碼可為該中央處理器之辨識碼、該硬碟機之辨識碼或是 該網路卡之辨識碼。 3. 如申請專利範圍第1項之方法,其中該伺服器主機中 包含有一用戶資料庫,以記錄經由該註冊程序所註冊之所 有合法的使用者及其終端機之辨識碼。 4. 如申請專利範圍第3項之方法,其中該伺服器主機中 包含有一加密鑰匙產生模組,該加密鑰匙產生模組會對該 用戶資料庫中所註冊之不同使用者各自產生該使用者專屬 之第二加密鑰匙。486902 6. Apply for the encryption of the m-key encryption key to form a corresponding ciphertext, and transmit the ciphertext to the terminal via the Internet; when the terminal ’s reading application receives the ciphertext, First decrypt the encrypted file of the terminal with the first encryption key, and obtain the second encryption key and the identification code of the terminal; and when the reading application compares the obtained terminal identification code with the current terminal When the identification codes are the same, the received cipher text is decrypted with the second encryption key, otherwise the subsequent decryption operation is stopped to prevent illegal copying of the electronic file by the illegal terminal. 2. If the method of claim 1 is applied, the terminal further includes a central processing unit, a hard disk drive, and a network card, and the identification code of the terminal may be the identification code of the central processing unit, The ID of the hard drive or the ID of the network card. 3. The method of claim 1 in the patent scope, wherein the server host includes a user database to record the identification codes of all legal users and their terminals registered through the registration process. 4. For the method in the third item of the patent application, wherein the server host includes an encryption key generation module, the encryption key generation module will generate the user for each different user registered in the user database. Exclusive second encryption key. 第26頁 486902 六、申請專利範圍 5. 如申請專利範圍第4項之方法,其中該伺服器主機中 包含有一密碼資料庫,該密碼資料庫中儲存有所有經過註 冊之使用者資料及其專屬之第二加密鑰匙。 6. 如申請專利範圍第1項之方法,其中該伺服器主機中 包含有一加密模組,當該終端機完成合法註冊後,該加密 模組會對該第二加密鑰匙與該使用者辨識碼加密後並傳送 至該合法註冊之終端機。 7. 如申請專利範圍第6項之方法,其中該伺服器主機中 包含有一電子文件資料庫以儲存複數個電子文件之明文資 料,以及一控制中心,用來控制該伺服器主機之操作。 8. 如申請專利範圍第7項之方法,其中當該伺服器主機 收到索取該電子文件之要求時,該控制中心會至該電子文 件資料庫調出該電子文件之明文資料,而該加密模組會以 該第二加密鑰匙對該電子文件之明文加密,以形成相對應 之密文。 9. 如申請專利範圍第1項之方法,其中該第一加密鑰匙 與該第二加密输匙皆為具有一二八位元之數位序列。 1 0 .如申請專利範圍第1項之方法,其中該伺服器主機中 包含有'一公用程式模組’以存放該閱讀應用程式並供使用 486902 六、申請專利範圍 者下載至該終端機中儲存使用。 。 1 1. 一種可防止電子文件盜拷之電腦糸統7該電腦糸統包 含有一伺服器主機可經由一網際網路以與複數個終端機相 連接,每一終端機並具有至少一代表該終端機之辨識碼, 一終端機可經由該網際網路向該伺服器主機提出索取一電 子文件之要求,該伺服器主機則可將該電子文件之明文經 過加密形成相對應之密文,並經由該網際網路傳送至該終 端機,以將該密文解密為原來之明文,該伺服器主機包含 有: 一公用程式模組,以存放包含一第一加密餘匙之閱讀 應用程式,該閱讀應用程式並可供使用者下載至該終端機 中儲存使用; 一註冊模組,當使用者利用該終端機之閱讀應用程式 向該伺服器主機註冊時,該註冊模組會產生一使用者辨識 碼並將該終端機註冊為一合法之終端機; 一加密鑰匙產生模組,用來產生一使用者專屬之第二 加密鑰匙;以及 一加密模組,用來將該使用者辨識碼與該第二加密鑰 匙加密,並傳送至該合法註冊之終端機中; 其中該終端機之閱讀應用程式並會進一步將接收到之 使用者辨識碼與第二加密鑰匙連同代表該終端機之電腦辨 識碼一併加密以形成一終端機加密檔,以儲存於該合法註 冊之終端機中,而當一終端機向該伺服器主機提出索取一Page 26 486902 6. Scope of patent application 5. For the method of scope 4 of the patent application, the server host includes a password database, and the password database stores all registered user data and their exclusive rights. The second encryption key. 6. If the method of applying for the first item of the patent scope, wherein the server host includes an encryption module, after the terminal has completed legal registration, the encryption module will register the second encryption key and the user identification code. Encrypted and transmitted to the legally registered terminal. 7. The method of claim 6 in the scope of patent application, wherein the server host includes an electronic file database to store clear text data of a plurality of electronic files, and a control center for controlling the operation of the server host. 8. If the method of claim 7 is applied, when the server host receives a request for the electronic document, the control center will go to the electronic document database to retrieve the plaintext information of the electronic document, and the encryption The module encrypts the plaintext of the electronic file with the second encryption key to form a corresponding ciphertext. 9. The method according to item 1 of the scope of patent application, wherein the first encryption key and the second encryption key are both digital sequences with one, two, and eight digits. 10. The method according to item 1 of the scope of patent application, wherein the server host includes a 'utility module' to store the reading application program for use 486902 6. Those who apply for the patent scope download to the terminal Store and use. . 1 1. A computer system capable of preventing theft of electronic files 7 The computer system includes a server host that can be connected to a plurality of terminals via an Internet, and each terminal has at least one representative of the terminal Machine identification code, a terminal may request the server host for an electronic document via the Internet, and the server host may encrypt the plaintext of the electronic document to form a corresponding ciphertext, and pass the The internet sends it to the terminal to decrypt the ciphertext into the original plaintext. The server host includes: a utility module to store a reading application that contains a first encrypted key, and the reading application The program can be downloaded to the terminal for storage and use; a registration module, when the user uses the terminal's reading application to register with the server host, the registration module will generate a user identification code And registering the terminal as a legitimate terminal; an encryption key generation module for generating a second encryption key exclusive to the user; and The encryption module is used for encrypting the user identification code and the second encryption key, and transmitting the encrypted user terminal to the legally registered terminal; wherein the reading application of the terminal will further receive the received user identification code Encrypt with the second encryption key together with the computer identification code representing the terminal to form a terminal encrypted file to be stored in the legally registered terminal, and when a terminal asks the server host for a 486902 六、申請專利範圍 電子文件之要求時,該加密模組會以該第二加密鑰匙將該 電子文件之明文加密而形成相對應之密文,並將該密文經 由該網際網路傳送至該終端機,當該終端機之閱讀應用程 式接收到該密文時,會先以該第一加密鑰匙對該終端機加 密檔解密,並取得其中之第二加密鑰匙與該辨識碼,而當 該閱讀應用程式比較所取得之辨識碼與目前終端機之辨識 碼為相同時,即以談第二加密鑰匙對該接收到的密文解 密,否則即停止後續之解密動作,以防止非合法之終端機 對該電子文件之盜拷。 1 2 .如申請專利範圍第1 1項之電腦系統,其中該終端機另 包含一中央處理器、一硬碟機以及一網路卡,而該終端機 之辨識碼可為該中央處理器之辨識碼、該硬碟機之辨識碼 或是該網路卡之辨識碼。 1 3.如申請專利範圍第1 1項之電腦系統,其中該伺服器主 機中包含有一用戶資料庫,以記錄所有合法註冊的使用者 及其終端機之辨識碼。 1 4.如申請專利範圍第1 1項之電腦系統,其中該伺服器主 機中包含有一密碼資料庫,該密碼資料庫中儲存有所有經 過註冊之使用者資料及其專屬之第二加密鑰匙。 1 5.如申請專利範圍第1 1項之電腦系統,其中該伺服器主486902 6. When requesting for an electronic document with a patent scope, the encryption module encrypts the plaintext of the electronic document with the second encryption key to form a corresponding ciphertext, and transmits the ciphertext via the Internet to The terminal, when the reading application of the terminal receives the ciphertext, first decrypts the encrypted file of the terminal with the first encryption key, and obtains the second encryption key and the identification code therein, and when When the identification code obtained by the reading application is the same as the identification code of the current terminal, the second encryption key is used to decrypt the received ciphertext, otherwise the subsequent decryption action is stopped to prevent illegal A stolen copy of the electronic file by the terminal. 12. The computer system according to item 11 of the scope of patent application, wherein the terminal further includes a central processing unit, a hard disk drive, and a network card, and the identification code of the terminal may be the central processing unit's ID, the ID of the hard drive, or the ID of the network card. 1 3. The computer system according to item 11 of the scope of patent application, wherein the server host contains a user database to record the identification codes of all legally registered users and their terminals. 14. The computer system according to item 11 of the scope of patent application, wherein the server host includes a password database, and the password database stores all registered user data and its exclusive second encryption key. 1 5. The computer system according to item 11 of the scope of patent application, wherein the server host 第29頁 486902 六、申請專利範圍 機中包含有一電子文件資料庫以儲存複數個電子文件之明 文資料,以及一控制中心,用來控制該伺服器主機之操 作。 1 6 .如申請專利範圍第1 5項之電腦系統,其中當該伺服器 主機收到索取該電子文件之要求時,該控制中心會至該電 子文件資料庫調出該電子文件之明文資料,而該加密模組 會以該第二加密鑰匙對該電子文件之明文加密,以形成相 對應之密文。 1 7.如申請專利範圍第1 1項之電腦系統,其中該第一加密 錄匙與該第二加密输匙皆為具有一二八位元之數位序列。Page 29 486902 6. Scope of patent application The machine contains an electronic file database to store the plaintext data of multiple electronic files, and a control center to control the operation of the server host. 16. If the computer system of item 15 of the scope of patent application, wherein when the server host receives a request for the electronic document, the control center will go to the electronic document database to retrieve the plaintext information of the electronic document, The encryption module encrypts the plaintext of the electronic file with the second encryption key to form a corresponding ciphertext. 1 7. The computer system according to item 11 of the scope of patent application, wherein the first encrypted recording key and the second encrypted input key are both digital sequences having a length of 128 bits.
TW089116219A 2000-08-11 2000-08-11 Method capable of preventing electronic documents from being illegally copied and its system TW486902B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW089116219A TW486902B (en) 2000-08-11 2000-08-11 Method capable of preventing electronic documents from being illegally copied and its system
US09/682,256 US20020034304A1 (en) 2000-08-11 2001-08-10 Method of preventing illegal copying of an electronic document

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW089116219A TW486902B (en) 2000-08-11 2000-08-11 Method capable of preventing electronic documents from being illegally copied and its system

Publications (1)

Publication Number Publication Date
TW486902B true TW486902B (en) 2002-05-11

Family

ID=21660741

Family Applications (1)

Application Number Title Priority Date Filing Date
TW089116219A TW486902B (en) 2000-08-11 2000-08-11 Method capable of preventing electronic documents from being illegally copied and its system

Country Status (2)

Country Link
US (1) US20020034304A1 (en)
TW (1) TW486902B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7764787B2 (en) 2003-06-19 2010-07-27 International Business Machines Corporation System and method for authenticating software using protected master key
TWI424329B (en) * 2010-05-26 2014-01-21 Prime View Int Co Ltd Electronic reading apparatus and the data protection method thereof
TWI463340B (en) * 2012-04-09 2014-12-01 Excellence Inc E Method and system for transferring a digital file

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004140757A (en) * 2002-10-21 2004-05-13 Toshiba Corp Encryption method of content, decoding method of decoding encrypted data, and apparatus of the same
US20050270572A1 (en) * 2003-04-03 2005-12-08 Web Bindery Llc System and method for virtual print devices for command implementation
US20060041839A1 (en) * 2003-04-03 2006-02-23 Peter Kassan System and method for providing formatted print pages
US20060005030A1 (en) * 2003-04-03 2006-01-05 Web Bindery Llc System and method for managing copyright information of electronic content
US7912214B2 (en) * 2007-07-20 2011-03-22 Amadeus S.A.S. Method and system for generating and controlling the distribution and use of personal promotion codes by targeted customers
US9349127B2 (en) * 2007-11-29 2016-05-24 Visa Usa Inc. Serial number and payment data based payment card processing
US8396799B2 (en) 2007-11-29 2013-03-12 Visa U.S.A. Inc. Media device payments remote control personalization and protection
AU2010202038B2 (en) * 2008-05-29 2016-01-14 Visa U.S.A. Inc. Serial number and payment data based payment card processing
US20170322977A1 (en) * 2014-11-07 2017-11-09 Hitachi, Ltd. Method for retrieving encrypted graph, system for retrieving encrypted graph, and computer
US10461939B2 (en) * 2017-02-08 2019-10-29 Ca, Inc. Secure device registration for multi-factor authentication
CN109510702B (en) * 2018-10-27 2023-05-16 福建福诺移动通信技术有限公司 Key storage and use method based on computer feature codes
US10827071B1 (en) 2019-07-05 2020-11-03 Talkdesk Inc. System and method for SMS and email enabled automated agent assistance within a cloud-based contact center
US11328205B2 (en) 2019-08-23 2022-05-10 Talkdesk, Inc. Generating featureless service provider matches
US20210117882A1 (en) 2019-10-16 2021-04-22 Talkdesk, Inc Systems and methods for workforce management system deployment
US20210136220A1 (en) 2019-10-31 2021-05-06 Talkdesk, Inc. Monitoring and listening tools across omni-channel inputs in a graphically interactive voice response system
US11736615B2 (en) 2020-01-16 2023-08-22 Talkdesk, Inc. Method, apparatus, and computer-readable medium for managing concurrent communications in a networked call center
US20220366070A1 (en) * 2021-05-14 2022-11-17 Oliver Fritz Glas Securing Sensitive Data Executed By Program Scripts In A Computing Device
US11677875B2 (en) 2021-07-02 2023-06-13 Talkdesk Inc. Method and apparatus for automated quality management of communication records
US11856140B2 (en) 2022-03-07 2023-12-26 Talkdesk, Inc. Predictive communications system
US11736616B1 (en) 2022-05-27 2023-08-22 Talkdesk, Inc. Method and apparatus for automatically taking action based on the content of call center communications
US11971908B2 (en) 2022-06-17 2024-04-30 Talkdesk, Inc. Method and apparatus for detecting anomalies in communication data
US11943391B1 (en) 2022-12-13 2024-03-26 Talkdesk, Inc. Method and apparatus for routing communications within a contact center

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6351536B1 (en) * 1997-10-01 2002-02-26 Minoru Sasaki Encryption network system and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7764787B2 (en) 2003-06-19 2010-07-27 International Business Machines Corporation System and method for authenticating software using protected master key
US7770021B2 (en) 2003-06-19 2010-08-03 International Business Machines Corporation Authenticating software using protected master key
TWI424329B (en) * 2010-05-26 2014-01-21 Prime View Int Co Ltd Electronic reading apparatus and the data protection method thereof
TWI463340B (en) * 2012-04-09 2014-12-01 Excellence Inc E Method and system for transferring a digital file

Also Published As

Publication number Publication date
US20020034304A1 (en) 2002-03-21

Similar Documents

Publication Publication Date Title
TW486902B (en) Method capable of preventing electronic documents from being illegally copied and its system
US8533860B1 (en) Personalized digital media access system—PDMAS part II
US9191376B2 (en) Securing digital content system and method
RU2352985C2 (en) Method and device for authorisation of operations with content
JP4274421B2 (en) Pseudo-anonymous user and group authentication method and system on a network
EP2267628B1 (en) Token passing technique for media playback devices
US7337332B2 (en) Transferring electronic content
US8402555B2 (en) Personalized digital media access system (PDMAS)
US8539233B2 (en) Binding content licenses to portable storage devices
US20100185868A1 (en) Personilized digital media access system
US20030161335A1 (en) Method and system to dynamically present a payment gateway for content distributed via a network
JP2009526321A (en) System for executing a transaction in a point-of-sale information management terminal using a changing identifier
JP2003058657A (en) Server and method for license management
US20090268912A1 (en) Data use managing system
JP2005536951A (en) Apparatus, system, and method for securing digital documents in a digital device
JP2003531447A5 (en)
AU2001269856A1 (en) Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (drm)
EP1407360A1 (en) Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (drm)
JP2002527009A (en) Method and system for distributing access to data items
KR101702748B1 (en) Method, system and recording medium for user authentication using double encryption
US20230108366A1 (en) Systems for encryption using blockchain distributed ledgers
JP2006109307A (en) Information processor and information processing method, and program
JP2004341832A (en) Personal information management method and system, issuing device for identifier for disclosure, and personal information disclosure device
WO2011058629A1 (en) Information management system
JP2003264540A (en) Method and system for distributing information

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees